Analysis Overview
SHA256
253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0
Threat Level: Known bad
The file 253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0.bin was found to be: Known bad.
Malicious Activity Summary
Irata family
Irata payload
Acquires the wake lock
Reads information about phone network operator.
Requests dangerous framework permissions
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-04-17 22:05
Signatures
Irata family
Irata payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an app to post notifications. | android.permission.POST_NOTIFICATIONS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-17 22:05
Reported
2024-04-17 22:29
Platform
android-x86-arm-20240221-en
Max time kernel
4s
Max time network
131s
Command Line
Signatures
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Processes
com.temptation.lydia
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.213.14:443 | android.apis.google.com | tcp |
Files
/data/data/com.temptation.lydia/files/PersistedInstallation3522494211696437188tmp
| MD5 | ec729d2cc02f01775cb423b233a863cf |
| SHA1 | 1992efbba7b5e9f264b396a3feddb72229609024 |
| SHA256 | 18c516d50d3636c7f3a23ede1469d2d794026cb559da1fbfb6a1cbb43b62cf98 |
| SHA512 | d624bfd7fd7712e5e857ac9604271457eaca4b3461fa6546d4fef58100b53717255498e9558cee61e382f9f13b7d90b58b4534e26c2a77d04afdf65811368ce3 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-17 22:05
Reported
2024-04-17 22:25
Platform
android-x64-20240221-en
Max time kernel
3s
Max time network
151s
Command Line
Signatures
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Reads information about phone network operator.
Processes
com.temptation.lydia
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.180.8:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.178.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.238:443 | android.apis.google.com | tcp |
| GB | 216.58.204.68:443 | tcp | |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.179.228:443 | www.google.com | tcp |
| GB | 142.250.187.238:443 | android.apis.google.com | tcp |
| GB | 142.250.200.2:443 | tcp |
Files
/data/data/com.temptation.lydia/files/PersistedInstallation2960799710968358586tmp
| MD5 | 5d0b99e8e539ac37c8a9ed273f1feb2a |
| SHA1 | c4ca6d4a3f77ce06249f6f3dc56fc98df2d3e675 |
| SHA256 | 261eb4a7c7c3c8cf7b35680f3ec26cdaa991415857f7c97b6fbc584b314f852f |
| SHA512 | 1684fdfa4e1b689034d84590dca72f24195d42aa897c67d4ec01d056ee9e79bc63ebf0c9453e8babde8f8e23fd26dfc624adddbf9c16dd96586b641345f79a0a |
Analysis: behavioral3
Detonation Overview
Submitted
2024-04-17 22:05
Reported
2024-04-17 22:26
Platform
android-x64-arm64-20240221-en
Max time kernel
3s
Max time network
131s
Command Line
Signatures
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Reads information about phone network operator.
Processes
com.temptation.lydia
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.200.14:443 | udp | |
| GB | 142.250.200.46:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.178.14:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.16.232:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.178.14:443 | android.apis.google.com | tcp |
| GB | 142.250.200.4:443 | tcp | |
| GB | 142.250.200.4:443 | tcp |
Files
/data/data/com.temptation.lydia/files/PersistedInstallation2510640441620850566tmp
| MD5 | d12bd4ea01079ccb6f1446c1222f2e2d |
| SHA1 | ffc606915cbfc0e4849a2ef561e9caa4b13d5ff3 |
| SHA256 | d66d4688103fa30f8cebad4b52407c00465c94f421e2c98bbc5b250ed1606788 |
| SHA512 | a1488ec1adb9b40c9f0a00278433e56dda55ec13cd3270ef52414ef9a1f533a460bac88eeac9747a09eb265eda185e3f271ae37501abe30d235437c998670f95 |